aboutsummaryrefslogtreecommitdiff
path: root/refer
blob: c8ab15ce7051f5e6bf6f93dd0622b9634ce5fab2 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
%T Stasiland
%A Anna Funder
%D 2003
%I Granta Books
%G ISBN 9781783787340

%T Global digital population as of January 2021
%A Joseph Johnson
%D 2021
%J Statista
%O https://www.statista.com/statistics/617136/digital-population-worldwide/"

%T Americans’ Internet Access: 2000-2015
%A Andrew Perrin 
%A Maeve Duggan
%J Pew Research Center
%D 2015
%O https://www.pewresearch.org/internet/2015/06/26/americans-internet-access-2000-2015

%A van Mill, David
%T Freedom of Speech
%J The Stanford Encyclopedia of Philosophy
%E Edward N. Zalta
%O https://plato.stanford.edu/archives/spr2021/entries/freedom-speech/
%D 2021
%C Metaphysics Research Lab, Stanford University

%T Why Twitter’s Mission Statement Matters
%A Justin Fox
%D 2014
%J Harvard Business Review
%O https://hbr.org/2014/11/why-twitters-mission-statement-matters

%T The great firewall of China: Xi Jinping’s internet shutdown
%A Elizabeth C. Economy
%D 2018
%J The Guardian
%O https://www.theguardian.com/news/2018/jun/29/the-great-firewall-of-china-xi-jinpings-internet-shutdown .

%T  Facebook’s push for end-to-end encryption is good news for user privacy, as well as terrorists and paedophiles
%J The Conversation
%A Roberto Musotto
%A David S. Wall 
%D December 2019
%O https://theconversation.com/facebooks-push-for-end-to-end-encryption-is-good-news-for-user-privacy-as-well-as-terrorists-and-paedophiles-128782 (Accessed 22 January 2022)

%T How Terrorists Use Encryption
%V Volume 9, Issue 6
%A Robert Graham
%D June 2016
%J CTC Sentinel 
%O https://ctc.usma.edu/how-terrorists-use-encryption/ (Accessed 22 January 2022)

%T The 9/11 Commission Report: Final Report of the National Commission on Terrorist Attacks Upon the United States (9/11 Report)
%A National^Commission^on^Terrorist^Attacks^Upon^the^United^States 
%D July 2004

%A Daniel Byman
%D 2014
%T The Intelligence War on Terrorism 
%J Intelligence and National Security
%V 29:6 
%P 837-863 
%G DOI: 10.1080/02684527.2013.851876

%T International statement: End-to-end encryption and public safety
%A Home^Office
%D Oct 2020
%O https://www.gov.uk/government/publications/international-statement-end-to-end-encryption-and-public-safety
(Accessed 29 January 2021)

%T Between Myth and Reality: The Stasi Legacy in German History
%A Konrad Jarausch
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
(Accessed 3rd January 2022)

%T Participatory Repression? Reflections on Popular Involvement with the Stasi
%A Gary Bruce
%D 2014
%J Bulletin of the German Historical Institute
%C German Historical Institute Washington DC
%O https://www.ghi-dc.org/fileadmin/publications/Bulletin_Supplement/Supplement_9/supp9.pdf
(Accessed 3rd January 2022)

%T N.S.A. Able to Foil Basic Safeguards of Privacy on Web
%J The New York Times
%A Nicole Perlroth
%A Jeff Larson 
%A Scott Shane
%D Sep 2013
%O https://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html
(Accessed 3rd February 2022)

%T Photos of an NSA “upgrade” factory show Cisco router getting implant
%A Sean Gallagher
%J Ars Technica
%D May 2014
%O https://arstechnica.com/tech-policy/2014/05/photos-of-an-nsa-upgrade-factory-show-cisco-router-getting-implant/
(Accessed 3rd February 2022)

%T Revealed: The NSA's Secret Campaign to Crack, Undermine Internet Security
%J Pro Publica
%A Jeff Larson
%D Sep 2013
%O https://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption
(Accessed 3rd February 2022)

%T U.S. Confirms That It Gathers Online Data Overseas
%A Charlie Savage
%A Edward Wyatt 
%A Peter Baker
%D June 2013
%J The New York Times
%O https://www.nytimes.com/2013/06/07/us/nsa-verizon-calls.html
(Accessed 17th February 2022)

%T NSA collecting phone records of millions of Verizon customers daily
%A Glenn Greenwald
%D June 2013
%J The Guardian
%O https://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order
(Accessed 17th February 2022)

%T Anger swells after NSA phone records court order revelations
%J The Guardian
%D June 2013
%A Dan Roberts
%A Spencer Ackerman
%O https://www.theguardian.com/world/2013/jun/06/obama-administration-nsa-verizon-records
(Accessed 17th February 2022)

-- lawmaking

%T US House passes bill to boost chip manufacturing and R&D
%J The Register
%D Feb 2022
%A Agam Shah
%O https://www.theregister.com/2022/02/05/us_house_passes_america_competes/
(Accessed 6th February 2022)

%A H.R.3773 
%T 110th Congress (2007-2008): FISA Amendments Act of 2008
%D (2008)

-- Intel management engine

%T Intel's Management Engine is a security hazard, and users need a way to disable it
%A Erica Portnoy 
%A Peter Eckersley
%D May 2017
%J Electronic Frontier Foundation
%O https://www.eff.org/deeplinks/2017/05/intels-management-engine-security-hazard-and-users-need-way-disable-it (Accessed 22 January 2022)

%T Intel ME controller chip has secret kill switch
%J The Register 
%A Thomas Claburn
%D Aug 2017
%O Accessed online on 6th February 2022

%T Researchers Find a Way to Disable Much-Hated Intel ME Component Courtesy of the NSA
%A Catalin Cimpanu
%J BleepingComputer
%D Aug 2017
%O https://www.bleepingcomputer.com/news/hardware/researchers-find-a-way-to-disable-much-hated-intel-me-component-courtesy-of-the-nsa/
(Accessed 6th February 2022)

-- Spectre, meltdown

%T Researchers Discover Two Major Flaws in the World’s Computers
%J The New York Times
%D Jan 2018
%A Cade Metz 
%A Nicole Perlroth
%O https://www.nytimes.com/2018/01/03/business/computer-flaws.html
(Accessed 7th February 2022)

-- quantum

%T Report on Post-Quantum Cryptography 
%A Lily Chen 
%A Stephen Jordan 
%A Yi-Kai Liu 
%A Dustin Moody 
%A Rene Peralta 
%A Ray Perlner 
%A Daniel Smith-Tone 
%J National Institute of Standards and Technology 
%D April 2016
%O https://nvlpubs.nist.gov/nistpubs/ir/2016/nist.ir.8105.pdf .

%T Quantum information research in China
%A Qiang Zhang
%A Feihu Xu
%A Li Li
%A Nai-Le Liu
%A Jian-Wei Pan
%D Nov 2019
%J Quantum Science and Technology
%V 4 040503 
%O https://iopscience.iop.org/article/10.1088/2058-9565/ab4bea/ .

%T Physicists in China challenge Google’s ‘quantum advantage’
%A Philip Ball 
%D Dec 2020
%J Nature
%O https://www.nature.com/articles/d41586-020-03434-7
(Accessed 13th January 2022)

%T Hello quantum world! Google publishes landmark quantum supremacy claim
%A Elizabeth Gibney 
%D Oct 2019
%J Nature
%O https://www.nature.com/articles/d41586-019-03213-z
(Accessed 13th January 2022)

%T Quantum computational advantage using photons
%A Han-Sen Zhong^et^al
%D 2020
%G DOI: 10.1126/science.abe8770

%T Google Claims To Achieve Quantum Supremacy — IBM Pushes Back
%J NPR
%D Oct 2019
%A Paolo Zialcita
%O https://www.npr.org/2019/10/23/772710977/google-claims-to-achieve-quantum-supremacy-ibm-pushes-back .